**Amendment 02 extends the RFI response due date to Wednesday, November 6, 2024.**
**Amendment 01 (AMD 01) provides Government responses to questions received from industry.**
THIS NOTICE IS NOT A REQUEST FOR PROPOSAL. This Request for Information (RFI) is for information and planning purposes only. The Government is conducting market research to improve its acquisition strategy and determine the availability and adequacy of potential sources in providing the capabilities to meet the requirements of the Government.
DISA, in support of the DoD, is seeking information from commercial vendors and integrators that can provide a managed, cloud-based, web browser isolation service that will isolate, contain, and render all non-government websites (.com, .net, etc.) in a secured cloud platform. This cloud environment will be configured to offload non-mission essential, commercial traffic, which will declutter DoD networks and provide enhanced cyber security protections by removing potentially malicious websites and source code rendering to a cloud-based, isolation chamber. The managed service must be hosted in a secured, cloud environment that is quickly accessible anywhere and at any time in the world.
DISA seeks information on a managed service that can deploy a Cloud Based Internet Isolation (CBII) solution that handles non-mission essential, commercial web traffic and browsing sessions for 3.4 to 3.6 million Non-classified Internet Protocol Router Network (NIPRNET) DoD users in a secured, cloud environment.
CBII services will reduce the bandwidth and cybersecurity risks associated with utilizing the internet browser on the Department of Defense Information Networks (DODIN). CBII will secure the Department's data and networks by taking an end users' (i.e., non-.mil/non-.gov) internet browsing off the endpoint (i.e., DoDIN) and isolating it within a cloud environment.
The proposed solution must include technologies that can detect the nature of Malicious Cyber Activity (MAC) and attacks, provide immediate, automated threat mitigations in real time against these threats, and capture threat analytics that can be reviewed by cyber protection teams